Senior Information Security Analyst - TS/SCI

Location
USA, Virginia, Chantilly
Posted
Aug 01, 2017
Closes
Sep 05, 2017
Ref
2017-26699
Contact
General Dynamics
Function
IT, Security Engineer
Hours
Full Time

  • Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
  • Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.
  • Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
  • Evaluate firewall change requests and assess organizational risk.
  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
  • Assists with implementation of counter-measures or mitigating controls.
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
  • Prepares incident reports of analysis methodology and results.
  • Provides guidance and work leadership to less-experienced technical staff members.
  • Maintains current knowledge of relevant technology as assigned.
  • Participates in special projects as required.

Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.

5-8 years of related experience in data security administration.

  • Cyber threat analyst involves a combination of: Advanced use of the forensic tools/investigations Investigating the Advanced Persistant Threat (APT); Organized Crime Hackers and Hackivists Hacker/Breach investigations; intrusion analysis; and advanced investigative strategies
  • Advanced computer forensics methodology
  • In-depth Windows FAT and exFAT file system examination
  • In-depth Windows NTFS file system examination Remote and complex forensic acquisition/analysis tactics
  • Advanced memory acquisition and analysis Live response and volatile evidence collection
  • System Restore points and Volume Shadow Copy Exploitation File System Timeline Analysis Super Timeline Analysis File System and data layer examination
  • Metadata and file name layer examination
  • File Sorting and hash comparison
  • Advanced file recovery Discovering unknown malware on a host
  • Recovering key Windows files
  • Indicators of compromise development and usage Step-by-step methodologies to investigate intrusion cases.

  • The CND Monitoring & Incident Response Analyst performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
  • She/he receives data about and performs further analysis on incidents that are escalated from the CND Watch to include Suspicious Cyber Activity Reports (SCARS).
  • Develops, refines, and performs advanced analysis techniques to uncover new or potential incidents.
  • Analysis techniques may be refined into training and process improvements that are promulgated back to the CND Watch for sustained operations.
  • Performs in-depth analysis techniques to uncover new or potential incidents.
  • Performs in-depth analysis and recommends defensive and proactive measures to thwart potential and malicious activity or inappropriate use by any internal or external entity to include: conducting malicious code activity analysis, determining the effects on a system or the network, assisting in gathering potential evidence for law enforcement, etc.
  • She/he prepares incident reports of analysis methodology and results.

Required Skills:
  • The successful candidate must have excellent verbal and written communication skills and strong work ethic.
  • He/she must have several years' experience with and be able to analyze Intrusion Detection Systems (IDS) to identify security issues for remediation
  • Evaluate firewall change requests and assess organizational risk
  • CND Incident Response Analyst and perform periodic and on-demand system audits and vulnerability assessments including user accounts, application access, file system, and external Web integrity scans to determine compliance.

Must possess appropriate current DoD Information Assurance (IA) Certification to be considered for employment; both IAT 2 and CNDSP Analyst. An appropriate IAT 2 certification would be one of the following: GSEC; Security + CE; SSCP; CCNA-Security; CISA; GCIH; GCED; CISSP; or CASP CE. An appropriate CNDSP Analyst certification would be one of the following: GCIA; CEH; or GCIH.

In addition; must attain the required DoD 8570 Computing Environment (CE) Certification within six (6) months of Hire Date. In some circumstances; Certified Ethical Hacker training will be provided to cover the CNDSP Analyst certification requirement. If selected; certification must be obtained 30 days after training completion date.


#CJPOST
#DPOST
#ZRpost